perl suid exploit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I run perl 5.8.3 in suid mode on Fedora Core 1, and
have recently detected an attempted exploit which
basically crashed my system (well, I was able to
recover by removing the 15 byte /etc/ld.so.preload
file which tries to reference, as part of the exploit,
a /tmp/getuid.so file).

I've brought the server up again, but am not sure now
how I can defend against this attack since FC1 and
perl 5.8.3 are the latest.

Anyone have any suggestions?

Thanks.

Michael.


Send instant messages to your online friends http://au.messenger.yahoo.com 

--

fedora-legacy-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-legacy-list

[Index of Archives]     [Fedora Development]     [Fedora Announce]     [Fedora Legacy Announce]     [Fedora Config]     [PAM]     [Fedora General Discussion]     [Big List of Linux Books]     [Gimp]     [Yosemite Questions]

  Powered by Linux